Download Record

Author

Date

Advisor

Second Reader

Metadata

Abstract

The major objective of this study is to identify a simplified methodology to reconstruct a secret that is distributed using Shamir’s Secret Sharing Scheme, and to use the derived results to investigate implications on Advanced Encryption Standard. This thesis begins by using existing mathematical conjectures to simplify a monic polynomial generated by the dealer in a threshold secret sharing scheme. The second part of the thesis then identifies the variable bounds that an individual (eavesdropper or outsider) can use to reconstruct the secret by gathering just two shares out of multiple public shares. In conclusion, the findings from the first two parts of the simplified secret sharing scheme can be effectively used to identify weaknesses of side-channel attacks, and subsequently applied to improve on the mechanics of Advanced Encryption Standard. Future work could include generalizing the methodology to include non-monic polynomials, or exploring the use of prime coefficients in the dealer-generated polynomial.

Related items

LONG-TERM GOALS: The ultimate goals are to substantially improve, quantitatively, the U.S. Navy’s mine burial predictive capabilities and to provide a complete data set of mine movement in water phase and mine impact burial ...

IEEE Supplement 2013. Supplement: IEEE 2012 Conference on Technology for Homeland Security: Best Papers
Homeland Security Affairs is proud to publish the best papers from the IEEE 2012 Conference on Technology for Homeland ...

This thesis analyzes the performance of German and U.S.-led PRTs currently deployed in Afghanistan. The major conclusion of this thesis is that the PRTs are limited in their capabilities to significantly reconstruct or ...